Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
18-08-2024 18:32
Behavioral task
behavioral1
Sample
2022335100e772e88fca34bc93c064112f8b0d966b5d550277445e8ca8a3aa35.exe
Resource
win7-20240705-en
windows7-x64
3 signatures
150 seconds
General
-
Target
2022335100e772e88fca34bc93c064112f8b0d966b5d550277445e8ca8a3aa35.exe
-
Size
74KB
-
MD5
52798305f5af009c6463de065b7720ac
-
SHA1
f333debd12556179da79787230edd74ac0595a35
-
SHA256
2022335100e772e88fca34bc93c064112f8b0d966b5d550277445e8ca8a3aa35
-
SHA512
9ca907c52cdcde217c69cdf45c52cec01035fd04de520b7b15a9496379a7c59020e8f9738b5ed850929373339700b5cdc1dd5e17757950a12d47e6843c6d5ce3
-
SSDEEP
1536:cyXUyccx4m3Cmv6PMVqmD7a3ISM1bh/gpEQzcWLVclN:cyXUjcx4qB6PMVa7M1bhopEQvBY
Malware Config
Extracted
Family
asyncrat
Version
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Botnet
plaka
Mutex
xgdhkdlzdpzntmowf
Attributes
-
delay
1
-
install
false
-
install_file
plaka
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.ai/raw/eydfn79gkq
aes.plain
Signatures
-
Processes:
resource yara_rule behavioral1/memory/3012-1-0x0000000000120000-0x0000000000138000-memory.dmp VenomRAT -
Suspicious use of AdjustPrivilegeToken 41 IoCs
Processes:
2022335100e772e88fca34bc93c064112f8b0d966b5d550277445e8ca8a3aa35.exedescription pid process Token: SeDebugPrivilege 3012 2022335100e772e88fca34bc93c064112f8b0d966b5d550277445e8ca8a3aa35.exe Token: SeIncreaseQuotaPrivilege 3012 2022335100e772e88fca34bc93c064112f8b0d966b5d550277445e8ca8a3aa35.exe Token: SeSecurityPrivilege 3012 2022335100e772e88fca34bc93c064112f8b0d966b5d550277445e8ca8a3aa35.exe Token: SeTakeOwnershipPrivilege 3012 2022335100e772e88fca34bc93c064112f8b0d966b5d550277445e8ca8a3aa35.exe Token: SeLoadDriverPrivilege 3012 2022335100e772e88fca34bc93c064112f8b0d966b5d550277445e8ca8a3aa35.exe Token: SeSystemProfilePrivilege 3012 2022335100e772e88fca34bc93c064112f8b0d966b5d550277445e8ca8a3aa35.exe Token: SeSystemtimePrivilege 3012 2022335100e772e88fca34bc93c064112f8b0d966b5d550277445e8ca8a3aa35.exe Token: SeProfSingleProcessPrivilege 3012 2022335100e772e88fca34bc93c064112f8b0d966b5d550277445e8ca8a3aa35.exe Token: SeIncBasePriorityPrivilege 3012 2022335100e772e88fca34bc93c064112f8b0d966b5d550277445e8ca8a3aa35.exe Token: SeCreatePagefilePrivilege 3012 2022335100e772e88fca34bc93c064112f8b0d966b5d550277445e8ca8a3aa35.exe Token: SeBackupPrivilege 3012 2022335100e772e88fca34bc93c064112f8b0d966b5d550277445e8ca8a3aa35.exe Token: SeRestorePrivilege 3012 2022335100e772e88fca34bc93c064112f8b0d966b5d550277445e8ca8a3aa35.exe Token: SeShutdownPrivilege 3012 2022335100e772e88fca34bc93c064112f8b0d966b5d550277445e8ca8a3aa35.exe Token: SeDebugPrivilege 3012 2022335100e772e88fca34bc93c064112f8b0d966b5d550277445e8ca8a3aa35.exe Token: SeSystemEnvironmentPrivilege 3012 2022335100e772e88fca34bc93c064112f8b0d966b5d550277445e8ca8a3aa35.exe Token: SeRemoteShutdownPrivilege 3012 2022335100e772e88fca34bc93c064112f8b0d966b5d550277445e8ca8a3aa35.exe Token: SeUndockPrivilege 3012 2022335100e772e88fca34bc93c064112f8b0d966b5d550277445e8ca8a3aa35.exe Token: SeManageVolumePrivilege 3012 2022335100e772e88fca34bc93c064112f8b0d966b5d550277445e8ca8a3aa35.exe Token: 33 3012 2022335100e772e88fca34bc93c064112f8b0d966b5d550277445e8ca8a3aa35.exe Token: 34 3012 2022335100e772e88fca34bc93c064112f8b0d966b5d550277445e8ca8a3aa35.exe Token: 35 3012 2022335100e772e88fca34bc93c064112f8b0d966b5d550277445e8ca8a3aa35.exe Token: SeIncreaseQuotaPrivilege 3012 2022335100e772e88fca34bc93c064112f8b0d966b5d550277445e8ca8a3aa35.exe Token: SeSecurityPrivilege 3012 2022335100e772e88fca34bc93c064112f8b0d966b5d550277445e8ca8a3aa35.exe Token: SeTakeOwnershipPrivilege 3012 2022335100e772e88fca34bc93c064112f8b0d966b5d550277445e8ca8a3aa35.exe Token: SeLoadDriverPrivilege 3012 2022335100e772e88fca34bc93c064112f8b0d966b5d550277445e8ca8a3aa35.exe Token: SeSystemProfilePrivilege 3012 2022335100e772e88fca34bc93c064112f8b0d966b5d550277445e8ca8a3aa35.exe Token: SeSystemtimePrivilege 3012 2022335100e772e88fca34bc93c064112f8b0d966b5d550277445e8ca8a3aa35.exe Token: SeProfSingleProcessPrivilege 3012 2022335100e772e88fca34bc93c064112f8b0d966b5d550277445e8ca8a3aa35.exe Token: SeIncBasePriorityPrivilege 3012 2022335100e772e88fca34bc93c064112f8b0d966b5d550277445e8ca8a3aa35.exe Token: SeCreatePagefilePrivilege 3012 2022335100e772e88fca34bc93c064112f8b0d966b5d550277445e8ca8a3aa35.exe Token: SeBackupPrivilege 3012 2022335100e772e88fca34bc93c064112f8b0d966b5d550277445e8ca8a3aa35.exe Token: SeRestorePrivilege 3012 2022335100e772e88fca34bc93c064112f8b0d966b5d550277445e8ca8a3aa35.exe Token: SeShutdownPrivilege 3012 2022335100e772e88fca34bc93c064112f8b0d966b5d550277445e8ca8a3aa35.exe Token: SeDebugPrivilege 3012 2022335100e772e88fca34bc93c064112f8b0d966b5d550277445e8ca8a3aa35.exe Token: SeSystemEnvironmentPrivilege 3012 2022335100e772e88fca34bc93c064112f8b0d966b5d550277445e8ca8a3aa35.exe Token: SeRemoteShutdownPrivilege 3012 2022335100e772e88fca34bc93c064112f8b0d966b5d550277445e8ca8a3aa35.exe Token: SeUndockPrivilege 3012 2022335100e772e88fca34bc93c064112f8b0d966b5d550277445e8ca8a3aa35.exe Token: SeManageVolumePrivilege 3012 2022335100e772e88fca34bc93c064112f8b0d966b5d550277445e8ca8a3aa35.exe Token: 33 3012 2022335100e772e88fca34bc93c064112f8b0d966b5d550277445e8ca8a3aa35.exe Token: 34 3012 2022335100e772e88fca34bc93c064112f8b0d966b5d550277445e8ca8a3aa35.exe Token: 35 3012 2022335100e772e88fca34bc93c064112f8b0d966b5d550277445e8ca8a3aa35.exe